Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245838
Bo-heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Jongsoo Jang
This paper proposes the kernel-level intrusion detection method (KIDM) using simplification and grouping of intrusion detection rules. These rules group into group-rule and common-rule generated by simplification. The intrusion detection is separated into common detection and extended detection step. The packet is checked by common detection using the common-rule. If this step detects nothing, the packet is forwarded to its destination. If not, it is passed into the extended detection using the group-rule. Through grouping of similar detection rules, the search space and searching time can be greatly minimized. Using the simplified rule in intrusion detection, the packet inspection time can be largely reduced. With the help of these two steps, fast and effective intrusion detection is possible in network nodes such as router and switch
{"title":"Kernel-level intrusion detection method using simplification and grouping","authors":"Bo-heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245838","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245838","url":null,"abstract":"This paper proposes the kernel-level intrusion detection method (KIDM) using simplification and grouping of intrusion detection rules. These rules group into group-rule and common-rule generated by simplification. The intrusion detection is separated into common detection and extended detection step. The packet is checked by common detection using the common-rule. If this step detects nothing, the packet is forwarded to its destination. If not, it is passed into the extended detection using the group-rule. Through grouping of similar detection rules, the search space and searching time can be greatly minimized. Using the simplified rule in intrusion detection, the packet inspection time can be largely reduced. With the help of these two steps, fast and effective intrusion detection is possible in network nodes such as router and switch","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245968
Jeong-Ju Yoo, Jae-Dong Park, Tae-Yeon Kim, H. Yun, Byoung-whi Kim
The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions
{"title":"WDM-PON platform development","authors":"Jeong-Ju Yoo, Jae-Dong Park, Tae-Yeon Kim, H. Yun, Byoung-whi Kim","doi":"10.1109/ICACT.2005.245968","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245968","url":null,"abstract":"The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246078
Youngil Kim, Joo-Sang Park, Taesu Cheong
`Ubiquitous Computing' was appeared first time by Mark Weiser in 1988. Recently, as basic technologies for realization are offered and technical necessity is appeared, various researches are progressed about this. Various forms of technologies are needed to satisfy ubiquitous computing environment, such as home networking, telematics, industry automation and so on. Particularly, in the industry automation field that utilizes RFID technology, there have been many researches on the automation of supply chain management, control of goods in stock, physical distribution management, warehouse management, etc. We report about current research contents about RFID middleware framework which is necessary for RFID application development in ubiquitous environments. Then we analyze this and propose to RFID middleware framework's development direction that is used in ubiquitous computing environment hereafter
{"title":"Study of RFID middleware framework for ubiquitous computing environment","authors":"Youngil Kim, Joo-Sang Park, Taesu Cheong","doi":"10.1109/ICACT.2005.246078","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246078","url":null,"abstract":"`Ubiquitous Computing' was appeared first time by Mark Weiser in 1988. Recently, as basic technologies for realization are offered and technical necessity is appeared, various researches are progressed about this. Various forms of technologies are needed to satisfy ubiquitous computing environment, such as home networking, telematics, industry automation and so on. Particularly, in the industry automation field that utilizes RFID technology, there have been many researches on the automation of supply chain management, control of goods in stock, physical distribution management, warehouse management, etc. We report about current research contents about RFID middleware framework which is necessary for RFID application development in ubiquitous environments. Then we analyze this and propose to RFID middleware framework's development direction that is used in ubiquitous computing environment hereafter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245860
G.Y. Il, M. Abdullah, S. Khatun, B. Ali
This paper proposes a prioritized scheduling in associated with contention resolution schemes for bufferless, single stage, non-blocking fully connected optical packet switch in synchronous optical packet switching network. We introduce a technique that integrates prioritized scheduling with wavelength conversion that can be realized by tunable optical wavelength converter (TOWC). It comprises a set of preemptive selective policies for contention resolution. This proposed scheme ensures packet loss probability below 10-10 that supports traffic load up to 50%, without suffering from conventional buffering delay. It guarantees real-time delivery for high priority packet with elimination of unnecessary wavelength conversion
{"title":"Prioritized scheduling for bufferless slotted WDM optical packet switch via wavelength conversion","authors":"G.Y. Il, M. Abdullah, S. Khatun, B. Ali","doi":"10.1109/ICACT.2005.245860","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245860","url":null,"abstract":"This paper proposes a prioritized scheduling in associated with contention resolution schemes for bufferless, single stage, non-blocking fully connected optical packet switch in synchronous optical packet switching network. We introduce a technique that integrates prioritized scheduling with wavelength conversion that can be realized by tunable optical wavelength converter (TOWC). It comprises a set of preemptive selective policies for contention resolution. This proposed scheme ensures packet loss probability below 10-10 that supports traffic load up to 50%, without suffering from conventional buffering delay. It guarantees real-time delivery for high priority packet with elimination of unnecessary wavelength conversion","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132375730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245931
Y. Yoon, Imsook Ha, M. Choi
this paper, we formulated an extended TAM (technology acceptance model) specific to mobile game under Wibro environment, and empirically validated it in Korea by SEM (structural equation modeling). Since mobile games under Wibro environment might inherit the properties of game and those of mobile device, we extended TAM with perceived enjoyment, attractiveness, sacrifice, flow experience, and social norm. We collected 1011 usable respondents by on-line survey. Overall, the results uncovered that the effect of perceived ease of use, enjoyment, and social norm are remarkably mighty and usefulness does not influence an individual's attitude and intention to play mobile game under Wibro environment. In addition, we also found out that age work as a key modifier of acceptance of playing mobile games under Wibro environment. The implication and limitation of this study are discussed
{"title":"Nature of potential mobile gamers' behavior under future wireless mobile environment","authors":"Y. Yoon, Imsook Ha, M. Choi","doi":"10.1109/ICACT.2005.245931","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245931","url":null,"abstract":"this paper, we formulated an extended TAM (technology acceptance model) specific to mobile game under Wibro environment, and empirically validated it in Korea by SEM (structural equation modeling). Since mobile games under Wibro environment might inherit the properties of game and those of mobile device, we extended TAM with perceived enjoyment, attractiveness, sacrifice, flow experience, and social norm. We collected 1011 usable respondents by on-line survey. Overall, the results uncovered that the effect of perceived ease of use, enjoyment, and social norm are remarkably mighty and usefulness does not influence an individual's attitude and intention to play mobile game under Wibro environment. In addition, we also found out that age work as a key modifier of acceptance of playing mobile games under Wibro environment. The implication and limitation of this study are discussed","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133864584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246115
Jungjoon Lee, J. Choi, Young Hwa Kim, B. Yae
This paper is concerned about an optimum access control algorithm to guarantee quality of service over an access networks. First, protocol and network architecture after introducing a motive and circumstance is mentioned. And there is some analysis of the queuing model for the access network. Finally the author concluded the effect and performance of this mechanism
{"title":"QoS class mapping mechanism at the access gateway","authors":"Jungjoon Lee, J. Choi, Young Hwa Kim, B. Yae","doi":"10.1109/ICACT.2005.246115","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246115","url":null,"abstract":"This paper is concerned about an optimum access control algorithm to guarantee quality of service over an access networks. First, protocol and network architecture after introducing a motive and circumstance is mentioned. And there is some analysis of the queuing model for the access network. Finally the author concluded the effect and performance of this mechanism","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246100
Sung-Woo Choi, Sangsung Choi
UWB is the most spotlighted wireless technology that transmits data at very high rates using low power over a wide spectrum of frequency band. UWB technology makes it possible to transmit data at rate over 400 Mbps in full specification mode and 200 Mbps in mandatory mode. To implement this high speed, it needs clock speed about several hundreds, it has some implementation bottle neck such as Viterbi decoder. In this paper, we analyze the requirements of Viterbi decoder for UWB system, and suggest appropriate architecture for 200 Mbps mandatory mode that could be implemented by ASIC. Using this architecture, we show the results that simulate optimum soft-input bit width and trace-back length. At last, we show hardware implementation results of Viterbi decoder for 200 Mbps mandatory mode
{"title":"20OMbps Viterbi decoder for UWB","authors":"Sung-Woo Choi, Sangsung Choi","doi":"10.1109/ICACT.2005.246100","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246100","url":null,"abstract":"UWB is the most spotlighted wireless technology that transmits data at very high rates using low power over a wide spectrum of frequency band. UWB technology makes it possible to transmit data at rate over 400 Mbps in full specification mode and 200 Mbps in mandatory mode. To implement this high speed, it needs clock speed about several hundreds, it has some implementation bottle neck such as Viterbi decoder. In this paper, we analyze the requirements of Viterbi decoder for UWB system, and suggest appropriate architecture for 200 Mbps mandatory mode that could be implemented by ASIC. Using this architecture, we show the results that simulate optimum soft-input bit width and trace-back length. At last, we show hardware implementation results of Viterbi decoder for 200 Mbps mandatory mode","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246011
Jae-Deok Lim, Minho Han, Jeong-Nyeo Kim
IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that can be applied to an embedded system such as router. We prove that this IKE protocol has been implemented based on RFC by working with the other commercial IKE protocol and show the negotiation performance of IKE protocol by using test tool
{"title":"Implementation of light-weight IKE protocol for IPsec VPN within router","authors":"Jae-Deok Lim, Minho Han, Jeong-Nyeo Kim","doi":"10.1109/ICACT.2005.246011","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246011","url":null,"abstract":"IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that can be applied to an embedded system such as router. We prove that this IKE protocol has been implemented based on RFC by working with the other commercial IKE protocol and show the negotiation performance of IKE protocol by using test tool","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246136
Cheonshu Park, Joochan Shon
This paper presents the method that model and process Web ontology data. That is, we describe the method that create and handle ontology object model in which to access, express and process Web ontology. With rising of semantic Web, there are many approaches that process ontology according to a characteristic of ontology data on Web. Recently, the resource description framework (RDF), DAML-OIL and Web ontology language (OWL) used as a language to express Web ontology. Hierarchical vocabulary architecture is to be composed of the top ontology layer of frame-base and the generic ontology layer that define common vocabulary use different domain and functional ontology layer which expressed the vocabulary that depend on generic ontology. By creating the ontology object model that used hierarchical vocabularies, we remove redundancy of an expression and can increase reusability. Furthermore, by using model access API, ontology external application such as reasoning, merging and authoring tools can easily access ontology object model and provide an easy knowledge representation about ontology
{"title":"A study on the web ontology processing system","authors":"Cheonshu Park, Joochan Shon","doi":"10.1109/ICACT.2005.246136","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246136","url":null,"abstract":"This paper presents the method that model and process Web ontology data. That is, we describe the method that create and handle ontology object model in which to access, express and process Web ontology. With rising of semantic Web, there are many approaches that process ontology according to a characteristic of ontology data on Web. Recently, the resource description framework (RDF), DAML-OIL and Web ontology language (OWL) used as a language to express Web ontology. Hierarchical vocabulary architecture is to be composed of the top ontology layer of frame-base and the generic ontology layer that define common vocabulary use different domain and functional ontology layer which expressed the vocabulary that depend on generic ontology. By creating the ontology object model that used hierarchical vocabularies, we remove redundancy of an expression and can increase reusability. Furthermore, by using model access API, ontology external application such as reasoning, merging and authoring tools can easily access ontology object model and provide an easy knowledge representation about ontology","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246185
Canfeng Chen, Weilin Wu
Wireless personal area network (WPAN) has been deemed one promising networking technique since diverse applications will be applicable in an ad hoc fashion in WPANs such as Bluetooth. Ultra wide band (UWB) has also become one hot research field because of its capability of supporting high-rate short-distance communications, and UWB-based WPAN has been receiving more and more research efforts recently. Though various piconet and scatternet formation algorithms have been proposed for Bluetooth-based WPAN, there is no systematical analysis and scheme for the newly emerged UWB-based WPAN, such as IEEE 802.15.3a, which exhibits some distinctions in topology construction. This paper first compares the difference of topology formation rationale and scheme between Bluetooth and UWB-based WPAN, then points out the fundamental problem pertinent to the piconet inter-connection in UWB-based WPAN. The main contribution of our work is to propose a multi-radio aided topology initialization algorithm without modification to the 802.15.3a specification. With the goal that all the participating devices get connected, the topology construction algorithm mainly includes bridge function, device positioning, and deliberate interconnections. A simulation-based study has shown that, compared with standard piconet initialization process, the network connectivity can be greatly enhanced by the proposed algorithm
{"title":"Multi-radio aided topology construction for UWB-based WPAN Scatternet","authors":"Canfeng Chen, Weilin Wu","doi":"10.1109/ICACT.2005.246185","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246185","url":null,"abstract":"Wireless personal area network (WPAN) has been deemed one promising networking technique since diverse applications will be applicable in an ad hoc fashion in WPANs such as Bluetooth. Ultra wide band (UWB) has also become one hot research field because of its capability of supporting high-rate short-distance communications, and UWB-based WPAN has been receiving more and more research efforts recently. Though various piconet and scatternet formation algorithms have been proposed for Bluetooth-based WPAN, there is no systematical analysis and scheme for the newly emerged UWB-based WPAN, such as IEEE 802.15.3a, which exhibits some distinctions in topology construction. This paper first compares the difference of topology formation rationale and scheme between Bluetooth and UWB-based WPAN, then points out the fundamental problem pertinent to the piconet inter-connection in UWB-based WPAN. The main contribution of our work is to propose a multi-radio aided topology initialization algorithm without modification to the 802.15.3a specification. With the goal that all the participating devices get connected, the topology construction algorithm mainly includes bridge function, device positioning, and deliberate interconnections. A simulation-based study has shown that, compared with standard piconet initialization process, the network connectivity can be greatly enhanced by the proposed algorithm","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}